Implementation of Clipboard Security Using Cryptographic Techniques

In the present scenario malicious authors are rapidly growing and now other than internet users they are also targeting the loophole in operating system application level security. Transferring data between applications is common user activity. Since data in a clipboard is freely delivered between arbitrary programs capable of using a format of the data, a simple text, a rich text, a picture, and information having a particular format may be delivered between programs capable of using such information.